Luca Caviglione

Learn More
By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, attacks and hazards to profile individuals or gather sensitive information. However, the majority of(More)
Social environments were already present in the original Web vision, but nowadays are mainly available through Online Social Networks (OSNs), which are a real cultural phenomenon. However, their actual deployment is very heterogeneous, reflecting into different development choices and functional architectures. Such aspects, jointly with the intrinsic(More)
Owing to an explosive growth, Web 2.0 technologies are now widespread. Moreover, they have been increasingly mixed with the cloud model to produce highly sophisticated services, also with an increased social flavor. In this perspective, Social Networks (SNs) are a paradigmatic example, allowing to share user-generated contents, while assuring a high degree(More)
Modern malware uses advanced techniques to hide from static and dynamic analysis tools. To achieve stealthiness when attacking a mobile device, an effective approach is the use of a covert channel built by two colluding applications to exchange data locally. Since this process is tightly coupled with the used hiding method, its detection is a challenging(More)
In sensor networks, both bandwidth allocation and Bandwidth on Demand (BoD) schemes may be adopted, on top of a generic multiple access protocol, for the purpose of differentiating various categories of devices that produce nonhomogenous data flows. At the same time, the modern Internet exhibits a trend toward an even more distributed architectural(More)
Green Security is a new research field defining and investigating security solutions under an energy-aware perspective. Green Security aims at: 1) evaluating the actual security mechanisms in order to assess their energy consumption; 2) building new security mechanisms by considering energy costs from the design phase. In this paper, we first provide a(More)